Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2014-1530

Published: 29 April 2014

The docshell implementation in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to trigger the loading of a URL with a spoofed baseURI property, and conduct cross-site scripting (XSS) attacks, via a crafted web site that performs history navigation.

Priority

Medium

CVSS 3 base score: 6.1

Status

Package Release Status
firefox
Launchpad, Ubuntu, Debian
lucid Ignored
(reached end-of-life)
precise
Released (29.0+build1-0ubuntu0.12.04.2)
quantal
Released (29.0+build1-0ubuntu0.12.10.3)
saucy
Released (29.0+build1-0ubuntu0.13.10.3)
trusty Does not exist
(trusty was released [29.0+build1-0ubuntu0.14.04.2])
upstream
Released (29.0)
thunderbird
Launchpad, Ubuntu, Debian
lucid Ignored
(reached end-of-life)
precise
Released (1:24.5.0+build1-0ubuntu0.12.04.1)
quantal
Released (1:24.5.0+build1-0ubuntu0.12.10.1)
saucy
Released (1:24.5.0+build1-0ubuntu0.13.10.1)
trusty Does not exist
(trusty was released [1:24.5.0+build1-0ubuntu0.14.04.1])
upstream
Released (24.5.0)